Backdoor

Backdoor:Win32/Ymacco.AA83 removal instruction

Malware Removal

The Backdoor:Win32/Ymacco.AA83 is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Backdoor:Win32/Ymacco.AA83 virus can do?

  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Sample contains Overlay data
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • A process created a hidden window
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • A scripting utility was executed
  • Uses Windows utilities for basic functionality
  • Uses Windows utilities for basic functionality
  • A script process created a new process
  • Attempts to interact with an Alternate Data Stream (ADS)

How to determine Backdoor:Win32/Ymacco.AA83?


File Info:

name: 4ADEBF82CA284298C46E.mlw
path: /opt/CAPEv2/storage/binaries/83ebb54f3859e0aaa1314888e7f93124e83f805c8e626feb4aeca4e3c6a8882c
crc32: 44904130
md5: 4adebf82ca284298c46e28286c910ccf
sha1: 8b628dc70ecaff8121e788593df18450efece67f
sha256: 83ebb54f3859e0aaa1314888e7f93124e83f805c8e626feb4aeca4e3c6a8882c
sha512: 20f5d8c7ebd579d8489436a45cb25727a81e06b50f7f984049a890d8dd0fedd1a99a3ff03b1924983cf4053303b46d76d83dbe5df397b85a7ffebb4d48ac7c7d
ssdeep: 24576:HAOcZEnhKDfirVM/Qu3ja476EdBymBJA5:5ZKL/YS3Vb3A5
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T1D4050202F6C188B2D0B22A35AE35AB656D7DB8201F35DF6FA7E4192DDB311805135FA3
sha3_384: b4d31331edc0d260902c31820a8a49bfdfc52deea16d3950371bb347d10696b3ba5e8dbb6b254098360504648e3ba346
ep_bytes: e89a040000e98efeffff3b0d68d64300
timestamp: 2020-03-26 10:02:47

Version Info:

0: [No Data]

Backdoor:Win32/Ymacco.AA83 also known as:

BkavW32.AIDetect.malware1
LionicTrojan.MSIL.LightStone.m!c
DrWebBackDoor.SpyBotNET.28
MicroWorld-eScanGen:Variant.Application.Fragtor.10652
FireEyeGeneric.mg.4adebf82ca284298
ALYacGen:Variant.Application.Fragtor.10652
CylanceUnsafe
VIPREGen:Variant.Application.Fragtor.10652
SangforSuspicious.Win32.Save.a
K7AntiVirusTrojan ( 004fbb2b1 )
AlibabaBackdoor:BAT/Runner.abe7933b
K7GWTrojan ( 004fbb2b1 )
CrowdStrikewin/malicious_confidence_100% (W)
CyrenW32/S-536dd2d1!Eldorado
SymantecTrojan.Gen.MBT
Elasticmalicious (high confidence)
ESET-NOD32BAT/Runner.EG
TrendMicro-HouseCallTROJ_GEN.R007C0RG922
Paloaltogeneric.ml
ClamAVWin.Malware.Uztuby-9797514-0
KasperskyHEUR:Trojan.BAT.Runner.gen
BitDefenderGen:Variant.Application.Fragtor.10652
AvastWin32:Malware-gen
Ad-AwareGen:Variant.Application.Fragtor.10652
EmsisoftGen:Variant.Application.Fragtor.10652 (B)
TrendMicroTROJ_GEN.R007C0RG922
McAfee-GW-EditionBehavesLike.Win32.Generic.bc
SophosMal/Generic-R + Mal/RarMal-R
IkarusTrojan.Uztuby
AviraTR/Runner.tkcov
MicrosoftBackdoor:Win32/Ymacco.AA83
ZoneAlarmHEUR:Trojan.BAT.Runner.gen
GDataWin32.Trojan.BSE.1CL7UZW
CynetMalicious (score: 100)
AhnLab-V3Malware/Gen.Generic.C2816286
McAfeeArtemis!4ADEBF82CA28
MAXmalware (ai score=76)
VBA32Trojan.Wacatac
MalwarebytesGeneric.Worm.Autorun.DDS
APEXMalicious
MaxSecureTrojan.Malware.102813951.susgen
FortinetW32/Uztuby.17!tr
AVGWin32:Malware-gen
Cybereasonmalicious.2ca284
PandaTrj/Genetic.gen

How to remove Backdoor:Win32/Ymacco.AA83?

Backdoor:Win32/Ymacco.AA83 removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment